]> nmode's Git Repositories - signal-cli/blob - lib/src/main/java/org/asamk/signal/manager/config/ServiceConfig.java
Update signal-service-java
[signal-cli] / lib / src / main / java / org / asamk / signal / manager / config / ServiceConfig.java
1 package org.asamk.signal.manager.config;
2
3 import org.signal.zkgroup.internal.Native;
4 import org.whispersystems.signalservice.api.account.AccountAttributes;
5 import org.whispersystems.signalservice.api.push.TrustStore;
6
7 import java.io.IOException;
8 import java.security.KeyStore;
9 import java.security.KeyStoreException;
10 import java.security.NoSuchAlgorithmException;
11 import java.security.cert.CertificateException;
12 import java.util.List;
13
14 import okhttp3.Interceptor;
15
16 public class ServiceConfig {
17
18 public final static int PREKEY_MINIMUM_COUNT = 20;
19 public final static int PREKEY_BATCH_SIZE = 100;
20 public final static int MAX_ATTACHMENT_SIZE = 150 * 1024 * 1024;
21 public final static long MAX_ENVELOPE_SIZE = 0;
22 public final static long AVATAR_DOWNLOAD_FAILSAFE_MAX_SIZE = 10 * 1024 * 1024;
23 public final static boolean AUTOMATIC_NETWORK_RETRY = true;
24
25 private final static KeyStore iasKeyStore;
26
27 public static final AccountAttributes.Capabilities capabilities;
28
29 static {
30 boolean zkGroupAvailable;
31 try {
32 Native.serverPublicParamsCheckValidContentsJNI(new byte[]{});
33 zkGroupAvailable = true;
34 } catch (Throwable ignored) {
35 zkGroupAvailable = false;
36 }
37 capabilities = new AccountAttributes.Capabilities(false, zkGroupAvailable, false, zkGroupAvailable);
38
39 try {
40 TrustStore contactTrustStore = new IasTrustStore();
41
42 KeyStore keyStore = KeyStore.getInstance("BKS");
43 keyStore.load(contactTrustStore.getKeyStoreInputStream(),
44 contactTrustStore.getKeyStorePassword().toCharArray());
45
46 iasKeyStore = keyStore;
47 } catch (KeyStoreException | CertificateException | IOException | NoSuchAlgorithmException e) {
48 throw new AssertionError(e);
49 }
50 }
51
52 public static AccountAttributes.Capabilities getCapabilities() {
53 return capabilities;
54 }
55
56 public static KeyStore getIasKeyStore() {
57 return iasKeyStore;
58 }
59
60 public static ServiceEnvironmentConfig getServiceEnvironmentConfig(
61 ServiceEnvironment serviceEnvironment, String userAgent
62 ) {
63 final Interceptor userAgentInterceptor = chain -> chain.proceed(chain.request()
64 .newBuilder()
65 .header("User-Agent", userAgent)
66 .build());
67
68 final List<Interceptor> interceptors = List.of(userAgentInterceptor);
69
70 switch (serviceEnvironment) {
71 case LIVE:
72 return new ServiceEnvironmentConfig(LiveConfig.createDefaultServiceConfiguration(interceptors),
73 LiveConfig.getUnidentifiedSenderTrustRoot(),
74 LiveConfig.createKeyBackupConfig(),
75 LiveConfig.getCdsMrenclave());
76 case SANDBOX:
77 return new ServiceEnvironmentConfig(SandboxConfig.createDefaultServiceConfiguration(interceptors),
78 SandboxConfig.getUnidentifiedSenderTrustRoot(),
79 SandboxConfig.createKeyBackupConfig(),
80 SandboxConfig.getCdsMrenclave());
81 default:
82 throw new IllegalArgumentException("Unsupported environment");
83 }
84 }
85 }